First published: Tue Dec 01 2020(Updated: )
WECON PLC Editor Versions 1.3.8 and prior has a stack-based buffer overflow vulnerability has been identified that may allow arbitrary code execution.
Credit: ics-cert@hq.dhs.gov
Affected Software | Affected Version | How to fix |
---|---|---|
WECON PLC Editor | <=1.3.8 | |
WECON PLC Editor Versions 1.3.8 and prior |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this WECON PLC Editor vulnerability is CVE-2020-25177.
CVE-2020-25177 has a severity rating of 8.8 (high).
The affected software is WECON PLC Editor version 1.3.8 and prior.
CVE-2020-25177 is a stack-based buffer overflow vulnerability in WECON PLC Editor that may allow arbitrary code execution.
Yes, it is recommended to update to a version of WECON PLC Editor later than 1.3.8 to mitigate the vulnerability.